The Infection Monkey can simulate the behavior of a cryptojacker by using the CPU and memory of infected systems to perform cryptographic operations. It can also send network requests that imitate bitcoin mining
This module is not considered safe for production environments because it can consume large amounts of CPU and RAM. If the module is configured to consume excessive amounts of CPU and RAM, it may cause some systems or services to become unstable. Users are advised to use caution when setting the CPU and memory utilization options to not negatively impact production environments.
This option controls how long the cryptojacking simulation will run. The simulation will automatically shut itself down after the configured time has elapsed.
The cryptojacking simulation will attempt to consume the specified percentage of a single CPU core.
The cryptojacking simulation will attempt to consume the specified percentage of system RAM. Note that an internal safeguard prevents this component from consuming more than 90% of the available RAM. Therefore, while specifying 100% is possible, this component has a theoretical upper limit that prevents it from consuming more than 90% of total system RAM.
If enabled, the cryptojacking simulation will send bitcoin
getblocktemplate requests via HTTP over the network to the Island. This can help verify that NIDSs are working properly.
Updated 2 months ago